# MS 3월 보안 위협에 따른 정기 보안 업데이트 권고\[2023-03]

## MS 3월 보안 위협에 따른 정기 보안 업데이트 권고

### □ 3월 보안업데이트 개요(총14종)

o 등급:긴급(Critical) 8종,중요(Important) 6종&#x20;

o 발표일: 2023.3.14.(화) o 업데이트 내용

| 제품군                                                | 중요도 | 영향         |
| -------------------------------------------------- | --- | ---------- |
| Windows 11 v22H2                                   | 긴급  | 원격 코드 실행   |
| Windows 11 v21H2                                   | 긴급  | 원격 코드 실행   |
| Windows 10 v22H2, Windows 10 21H2, Windows 10 20H2 | 긴급  | 원격 코드 실행   |
| Windows Server 2022                                | 긴급  | 원격 코드 실행   |
| Windows Server 2019                                | 긴급  | 원격 코드 실행   |
| Windows Server 2016                                | 긴급  | 원격 코드 실행   |
| Windows Server 2012 R2및Windows Server 2012         | 긴급  | 원격 코드 실행   |
| Microsoft Office                                   | 긴급  | 권한 상승      |
| Microsoft SharePoint                               | 중요  | 보안 기능 바이패스 |
| <p>Microsoft Exchange Server</p><p>(재릴리스)</p>      | 중요  | 원격 코드 실행   |
| Microsoft Visual Studio                            | 중요  | 원격 코드 실행   |
| Microsoft Dynamics 365                             | 중요  | 보안 기능 바이패스 |
| <p>Microsoft Azure관련 </p><p>소프트웨어</p>              | 중요  | 보안 기능 바이패스 |
| Microsoft Malware Protection Engine                | 중요  | 권한 상승      |

### \[참고 사이트]&#x20;

\[1] (한글) <https://portal.msrc.microsoft.com/ko-kr/security-guidance&#x20>;

\[2] (영문) <https://portal.msrc.microsoft.com/en-us/security-guidance&#x20>;

\[3] <https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar&#x20>;

\[4] <https://msrc.microsoft.com/update-guide>

#### o취약점 요약 정보

<table><thead><tr><th width="202.33333333333331">제품 카테고리</th><th width="174">CVE번호</th><th>CVE제목</th></tr></thead><tbody><tr><td>Microsoft OneDrive</td><td>CVE-2023-24930</td><td>MacOS용Microsoft OneDrive권한 상승 취약성</td></tr><tr><td>Microsoft OneDrive</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24923">CVE-2023-24923</a></td><td>Android용Microsoft OneDrive정보 공개 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24922">CVE-2023-24922</a></td><td>Microsoft Dynamics 365정보 공개 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24921">CVE-2023-24921</a></td><td>Microsoft Dynamics 365(온-프레미스)교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24920">CVE-2023-24920</a></td><td>Microsoft Dynamics 365(온-프레미스)교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24919">CVE-2023-24919</a></td><td>Microsoft Dynamics 365(온-프레미스)교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24913">CVE-2023-24913</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24911">CVE-2023-24911</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft Graphics Component</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24910">CVE-2023-24910</a></td><td>Windows그래픽 구성 요소 권한 상승 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24909">CVE-2023-24909</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call Runtime</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24908">CVE-2023-24908</a></td><td>원격 프로시저 호출 런타임 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24907">CVE-2023-24907</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24906">CVE-2023-24906</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24892">CVE-2023-24892</a></td><td>Microsoft Edge(Chromium기반) Webview2스푸핑 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24891">CVE-2023-24891</a></td><td>Microsoft Dynamics 365(온-프레미스)교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft OneDrive</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24890">CVE-2023-24890</a></td><td>iOS용Microsoft OneDrive보안 기능 바이패스 취약성</td></tr><tr><td>Microsoft OneDrive</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24882">CVE-2023-24882</a></td><td>Android용Microsoft OneDrive정보 공개 취약성</td></tr><tr><td>Windows SmartScreen</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880">CVE-2023-24880</a></td><td>Windows SmartScreen보안 기능 우회 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24879">CVE-2023-24879</a></td><td>Microsoft Dynamics 365(온-프레미스)교차-사이트 스크립팅 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24876">CVE-2023-24876</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24872">CVE-2023-24872</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Bluetooth Service</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24871">CVE-2023-24871</a></td><td>Windows Bluetooth서비스 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24870">CVE-2023-24870</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows Remote Procedure Call Runtime</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24869">CVE-2023-24869</a></td><td>원격 프로시저 호출 런타임 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24868">CVE-2023-24868</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24867">CVE-2023-24867</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24866">CVE-2023-24866</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24865">CVE-2023-24865</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24864">CVE-2023-24864</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 권한 상승 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24863">CVE-2023-24863</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Windows Secure Channel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24862">CVE-2023-24862</a></td><td>Windows보안 채널 서비스 거부 취약성</td></tr><tr><td>Windows Win32K</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24861">CVE-2023-24861</a></td><td>Windows그래픽 구성 요소 권한 상승 취약성</td></tr><tr><td>Windows Internet Key Exchange (IKE) Protocol</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859">CVE-2023-24859</a></td><td>Windows IKE(Internet Key Exchange)확장 서비스 거부 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858">CVE-2023-24858</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857">CVE-2023-24857</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856">CVE-2023-24856</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 정보 공개 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23946">CVE-2023-23946</a></td><td>GitHub: CVE-2023-23946 Git경로 통과 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23618">CVE-2023-23618</a></td><td>GitHub: CVE-2023-23618 Git for Windows원격 코드 실행 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23423">CVE-2023-23423</a></td><td>Windows커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23422">CVE-2023-23422</a></td><td>Windows커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23421">CVE-2023-23421</a></td><td>Windows커널 권한 상승 취약성</td></tr><tr><td>Windows Kernel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420">CVE-2023-23420</a></td><td>Windows커널 권한 상승 취약성</td></tr><tr><td>Windows Resilient File System (ReFS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23419">CVE-2023-23419</a></td><td>Windows ReFS(복원 파일 시스템)권한 상승 취약성</td></tr><tr><td>Windows Resilient File System (ReFS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23418">CVE-2023-23418</a></td><td>Windows ReFS(복원 파일 시스템)권한 상승 취약성</td></tr><tr><td>Windows Partition Management Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23417">CVE-2023-23417</a></td><td>Windows파티션 관리 드라이버 권한 상승 취약성</td></tr><tr><td>Windows Cryptographic Services</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23416">CVE-2023-23416</a></td><td>Windows암호화 서비스 원격 코드 실행 취약성</td></tr><tr><td>Internet Control Message Protocol (ICMP)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415">CVE-2023-23415</a></td><td>ICMP(Internet Control Message Protocol)원격 코드 실행 취약성</td></tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23414">CVE-2023-23414</a></td><td>Windows PPPoE(Point-to-Point Protocol over Ethernet)원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23413">CVE-2023-23413</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Accounts Control</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23412">CVE-2023-23412</a></td><td>Windows계정 사진 권한 상승 취약성</td></tr><tr><td>Role: Windows Hyper-V</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23411">CVE-2023-23411</a></td><td>Windows Hyper-V서비스 거부 취약성</td></tr><tr><td>Windows HTTP.sys</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23410">CVE-2023-23410</a></td><td>Windows HTTP.sys권한 상승 취약성</td></tr><tr><td>Client Server Run-time Subsystem (CSRSS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23409">CVE-2023-23409</a></td><td>CSRSS(Client Server Run-Time Subsystem)정보 공개 취약성</td></tr><tr><td>Azure</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23408">CVE-2023-23408</a></td><td>Azure Apache Ambari스푸핑 취약성</td></tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23407">CVE-2023-23407</a></td><td>Windows PPPoE(Point-to-Point Protocol over Ethernet)원격 코드 실행 취약성</td></tr><tr><td>Microsoft PostScript Printer Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23406">CVE-2023-23406</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call Runtime</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23405">CVE-2023-23405</a></td><td>원격 프로시저 호출 런타임 원격 코드 실행 취약성</td></tr><tr><td>Remote Access Service Point-to-Point Tunneling Protocol</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23404">CVE-2023-23404</a></td><td>Windows지점 간 터널링 프로토콜 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Printer Drivers</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23403">CVE-2023-23403</a></td><td>Microsoft PostScript및PCL6 Class프린터 드라이버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23402">CVE-2023-23402</a></td><td>Windows Media원격 코드 실행 취약성</td></tr><tr><td>Microsoft Windows Codecs Library</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23401">CVE-2023-23401</a></td><td>Windows Media원격 코드 실행 취약성</td></tr><tr><td>Role: DNS Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23400">CVE-2023-23400</a></td><td>Windows DNS서버 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399">CVE-2023-23399</a></td><td>Microsoft Excel원격 코드 실행 취약성</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23398">CVE-2023-23398</a></td><td>Microsoft Excel Spoofing Vulnerability</td></tr><tr><td>Microsoft Office Outlook</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397">CVE-2023-23397</a></td><td>Microsoft Outlook Elevation of Privilege Vulnerability</td></tr><tr><td>Microsoft Office Excel</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23396">CVE-2023-23396</a></td><td>Microsoft Excel서비스 거부 취약성</td></tr><tr><td>Microsoft Office SharePoint</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23395">CVE-2023-23395</a></td><td>Microsoft SharePoint Server스푸핑 취약성</td></tr><tr><td>Client Server Run-time Subsystem (CSRSS)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23394">CVE-2023-23394</a></td><td>CSRSS(Client Server Run-Time Subsystem)정보 공개 취약성</td></tr><tr><td>Windows Central Resource Manager</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23393">CVE-2023-23393</a></td><td>Windows BrokerInfrastructure Service권한 상승 취약성</td></tr><tr><td>Windows HTTP Protocol Stack</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23392">CVE-2023-23392</a></td><td>HTTP프로토콜 스택 원격 코드 실행 취약성</td></tr><tr><td>Office for Android</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23391">CVE-2023-23391</a></td><td>Android용Office스푸핑 취약성</td></tr><tr><td>Windows Defender</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23389">CVE-2023-23389</a></td><td>Microsoft Defender권한 상승 취약성</td></tr><tr><td>Microsoft Bluetooth Driver</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23388">CVE-2023-23388</a></td><td>Windows Bluetooth드라이버 권한 상승 취약성</td></tr><tr><td>Windows Point-to-Point Protocol over Ethernet (PPPoE)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23385">CVE-2023-23385</a></td><td>Windows PPPoE(Point-to-Point Protocol over Ethernet)권한 상승 취약성</td></tr><tr><td>Service Fabric</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23383">CVE-2023-23383</a></td><td>Service Fabric Explorer스푸핑 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22743">CVE-2023-22743</a></td><td>GitHub: CVE-2023-22743 - Git for Windows Installer권한 상승 취약성</td></tr><tr><td>Visual Studio</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-22490">CVE-2023-22490</a></td><td>GitHub: CVE-2023-22490비로컬 전송을 통한 로컬 클론 기반 데이터 반출</td></tr><tr><td>Power BI</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21806">CVE-2023-21806</a></td><td>Power BI보고 서버 스푸핑 취약성</td></tr><tr><td>Windows MSHTML Platform</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805">CVE-2023-21805</a></td><td>Windows MSHTML플랫폼 원격 코드 실행 취약성</td></tr><tr><td>Windows Remote Procedure Call</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21708">CVE-2023-21708</a></td><td>원격 프로시저 호출 런타임 원격 코드 실행 취약성</td></tr><tr><td>Microsoft Exchange Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21707">CVE-2023-21707</a></td><td>Microsoft Exchange Server원격 코드 실행 취약성</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1236">CVE-2023-1236</a></td><td>Chromium: CVE-2023-1236 Internals에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1235">CVE-2023-1235</a></td><td>Chromium: CVE-2023-1235 DevTools에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1234">CVE-2023-1234</a></td><td>Chromium: CVE-2023-1234 Intents에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1233">CVE-2023-1233</a></td><td>Chromium: CVE-2023-1233 Resource Timing에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1232">CVE-2023-1232</a></td><td>Chromium: CVE-2023-1232 Resource Timing에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1231">CVE-2023-1231</a></td><td>Chromium: CVE-2023-1231자동 채우기에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1230">CVE-2023-1230</a></td><td>Chromium: CVE-2023-1230 WebApp Installs에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1229">CVE-2023-1229</a></td><td>Chromium: CVE-2023-1229권한 프롬프트에서 부적절한 구현</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1228">CVE-2023-1228</a></td><td>Chromium: CVE-2023-1228 Intents에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1224">CVE-2023-1224</a></td><td>Chromium: CVE-2023-1224 Web Payments API에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1223">CVE-2023-1223</a></td><td>Chromium: CVE-2023-1223자동 채우기에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1222">CVE-2023-1222</a></td><td>Chromium: CVE-2023-1222 Web Audio API에서 힙 버퍼 오버플로</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1221">CVE-2023-1221</a></td><td>Chromium: CVE-2023-1221 Extensions API에서 불충분한 정책 적용</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1220">CVE-2023-1220</a></td><td>Chromium: CVE-2023-1220 UMA에서 힙 버퍼 오버플로</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1219">CVE-2023-1219</a></td><td>Chromium: CVE-2023-1219메트릭에서 힙 버퍼 오버플로</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1218">CVE-2023-1218</a></td><td>Chromium: CVE-2023-1218 WebRTC에서UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1217">CVE-2023-1217</a></td><td>Chromium: CVE-2023-1217크래시 보고에서 스택 버퍼 오버플로</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1216">CVE-2023-1216</a></td><td>Chromium: CVE-2023-1216 DevTools에서UaF(Use after free)</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1215">CVE-2023-1215</a></td><td>Chromium: CVE-2023-1215 CSS에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1214">CVE-2023-1214</a></td><td>Chromium: CVE-2023-1214 V8에서 유형 혼란</td></tr><tr><td>Microsoft Edge (Chromium-based)</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1213">CVE-2023-1213</a></td><td>Chromium: CVE-2023-1213 Swiftshader에서UaF(Use after free)</td></tr><tr><td>Windows TPM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1018">CVE-2023-1018</a></td><td>CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability</td></tr><tr><td>Windows TPM</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1017">CVE-2023-1017</a></td><td>Microsoft TPM(신뢰할 수 있는 플랫폼 모듈)권한 상승 취약성</td></tr><tr><td>Open Source Software</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-43552">CVE-2022-43552</a></td><td>오픈 소스Curl원격 코드 실행 취약성</td></tr><tr><td>Microsoft Dynamics</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41127">CVE-2022-41127</a></td><td>Microsoft Dynamics NAV및Microsoft Dynamics 365 Business Central(온-프레미스)원격 코드 실행 취약성</td></tr><tr><td>AMD CPU Branch</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825">CVE-2022-23825</a></td><td>AMD: CVE-2022-23825 AMD CPU분기 유형 혼동</td></tr><tr><td>AMD CPU Branch</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23816">CVE-2022-23816</a></td><td>AMD: CVE-2022-23816 AMD CPU분기 유형 혼동</td></tr><tr><td>Role: Windows Hyper-V</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257">CVE-2022-23257</a></td><td>Windows Hyper-V원격 코드 실행 취약성</td></tr><tr><td>Windows DCOM Server</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26414">CVE-2021-26414</a></td><td>Windows DCOM서버 보안 기능 우회</td></tr><tr><td>Servicing Stack Updates</td><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV990001">ADV990001</a></td><td>최신 서비스 스택 업데이트</td></tr></tbody></table>

### □ 작성 : \[KISA] 취약점분석팀

## 출처 : [KISA 바로가기](https://www.krcert.or.kr/kr/bbs/view.do?searchCnd=\&bbsId=B0000133\&searchWrd=\&menuNo=205020\&pageIndex=1\&categoryCode=\&nttId=71011)

{% embed url="<https://doc.skill.or.kr>" %}
NHN Cloud 정보 사이트&#x20;
{% endembed %}

{% embed url="<https://ssv.skill.or.kr>" %}
취약점 진단 분석 평가 방법 사이트&#x20;
{% endembed %}
